Example: bachelor of science

iOS and iPadOS Deployment Overview

IOS and iPadOS Deployment OverviewOverviewOverview iPhone and iPad, combined with iOS and iPadOS , enable employees to get their best work done from anywhere. And they allow IT departments to spend less time managing devices empowering them to shape business strategy and focus on needs beyond fixing technology and cutting costs. This document offers guidance on deploying iOS and iPadOS devices in your organization and helps you lay the foundation for a Deployment plan that best suits your environment. These topics, including what s new in deploying with the latest iOS and iPadOS updates, are covered in greater detail in the online Apple Platform Deployment and iPadOS Deployment Overview December 2021 2 Contents Overview Ownership Models Deployment Steps Device Security Support Options Summary and ResourcesOwnership ModelsOwnership Models These are the two ownership models for iOS and iPadOS devices that organizations commonly use: Organization-owned User-owned Each model has its benefits, so it s important to choose the one that s best for your organization.

Mobile device management allows you to configure and manage devices, and wirelessly distribute and manage apps. ... based Office 365, ensure that you have sufficient licenses to support the ... and remotely wipe or lock managed devices. These management features are enabled by third-party MDM solutions.

Tags:

  Devices, Mobile, Office, Wipe, Mobile devices, Remotely, Office 365, Remotely wipe

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of iOS and iPadOS Deployment Overview

1 IOS and iPadOS Deployment OverviewOverviewOverview iPhone and iPad, combined with iOS and iPadOS , enable employees to get their best work done from anywhere. And they allow IT departments to spend less time managing devices empowering them to shape business strategy and focus on needs beyond fixing technology and cutting costs. This document offers guidance on deploying iOS and iPadOS devices in your organization and helps you lay the foundation for a Deployment plan that best suits your environment. These topics, including what s new in deploying with the latest iOS and iPadOS updates, are covered in greater detail in the online Apple Platform Deployment and iPadOS Deployment Overview December 2021 2 Contents Overview Ownership Models Deployment Steps Device Security Support Options Summary and ResourcesOwnership ModelsOwnership Models These are the two ownership models for iOS and iPadOS devices that organizations commonly use: Organization-owned User-owned Each model has its benefits, so it s important to choose the one that s best for your organization.

2 While most organizations have a preferred model, you might use multiple models in your environment. Once you ve identified the right model for your organization, your team can explore Apple s Deployment and management capabilities in detail. Organization-owned devices In an organization-owned model, devices are purchased by your organization or a participating Apple Authorized Reseller or carrier. If a device is provided to each user, this is referred to as a one-to-one Deployment . devices can also be rotated among users, which is commonly referred to as a shared Deployment . Shared iPad, an ownership model that enables multiple users to share an iPad device without sharing information, is an example of shared Deployment . Organizations can use a combination of shared and one-to-one Deployment models throughout their environments.

3 When using an organization-owned model, IT maintains a higher level of control with supervision and Automated Device Enrollment, which lets organizations configure and manage devices from the moment they re removed from the box. Learn more about restrictions for supervised IT has more control when Apple devices are supervised. iOS and iPadOS Deployment Overview December 2021 3 Configure accounts Configure global proxies Install, configure, and remove apps Require a complex passcode Enforce all restrictions Access inventory of all apps remotely erase the entire device Manage software updates Remove system apps Modify the wallpaper Lock into a single app Bypass Activation Lock Force Wi-Fi on Place device in Lost ModeOwnership ModelsUser-owned devices In a user-owned model, users purchase, set up, and configure the devices .

4 These types of deployments are commonly referred to as BYOD, or bring your own device deployments. To use organizational services such as Wi-Fi, mail, and calendars or to configure devices for specific education or business requirements, users typically enroll their devices in an organization s mobile device management (MDM) solution. They do this using an Apple feature called User Enrollment. User Enrollment allows corporate resources and data to be managed securely while also respecting the user s privacy and personal data and apps. IT can enforce, access, and manage specific functions, which are outlined in the table below. To access corporate data on their devices , users leverage their Managed Apple IDs. A Managed Apple ID is part of the User Enrollment profile, and the user must successfully authenticate for enrollment to be completed.

5 The Managed Apple ID can be used alongside the personal Apple ID that the user has already signed in with, and the two don t interact with each other. This creates data separation on the device. For organizations with iCloud storage space, a separate iCloud Drive will be created for all data managed under the Managed Apple ID. Learn more about User Enrollment in MDM MDM functions are limited on personal devices . iOS and iPadOS Deployment Overview December 2021 4 Configure accounts Configure Per App VPN Install and configure apps Require a passcode Enforce certain restrictions Access inventory of work apps Remove work data only Access personal information Access inventory of personal apps Remove any personal data Collect any logs on the device Take over personal apps Require a complex passcode remotely wipe the entire device Access device locationDeployment StepsDeployment Steps This section provides an Overview of the five steps for deploying devices and content: preparing the environment, setting up devices , deploying them, and managing them.

6 The steps you use will depend on whether the devices are owned by the organization or the users. To view these steps in more detail, visit the online Apple Platform Deployment Guide. 1. Integration and setup After identifying the right Deployment model for your organization, it s important to lay the groundwork for Deployment . MDM solution. Apple s management framework for iOS and iPadOS gives organizations the ability to securely enroll devices in the corporate environment, wirelessly configure and update settings, monitor policy compliance, deploy apps and books, and remotely wipe or lock managed devices . These management features are enabled by third-party MDM solutions. A variety of third-party MDM solutions are available to support different server platforms.

7 Each solution offers different management consoles, features, and pricing. Apple Business Manager. This web-based portal allows IT administrators to deploy iPhone, iPad, iPod touch, Apple TV, and Mac all from one place. Apple Business Manager works seamlessly with your MDM solution, making it easy to automate device Deployment , purchase apps and distribute content, and create Managed Apple IDs for employees. Managed Apple IDs. Like personal Apple IDs, Managed Apple IDs are used to sign in to Apple devices and services such as FaceTime, iMessage, the App Store, iCloud, iWork, and Notes giving users access to a wide range of content and features that can increase productivity and support collaboration. But Managed Apple IDs are owned by the organization, and they re an integral part of Apple device management.

8 They allow your organization to manage things like password resets and role-based administration, and they have certain restricted settings. Learn more about Managed Apple IDs: iOS and iPadOS Deployment Overview December 2021 5 Deployment StepsWi-Fi and networking. Apple devices have secure wireless network connectivity built in. Confirm that your company s Wi-Fi network can support multiple devices with simultaneous connections from all your users. And ensure that your network infrastructure is set up to work correctly with Bonjour, Apple s standards-based, zero-configuration network protocol. Bonjour enables devices to automatically find services on a network. iOS and iPadOS devices use Bonjour to connect to AirPrint-compatible printers and AirPlay-compatible devices , such as Apple TV.

9 And some apps use Bonjour to discover other devices for collaboration and sharing. Learn more about Wi-Fi and Learn more about VPN. Evaluate your VPN infrastructure to make sure users are able to securely access company resources remotely from their iOS and iPadOS devices . Consider using the VPN On Demand or Per App VPN feature of iOS and iPadOS so that a VPN connection is initiated only when needed. If you plan to use Per App VPN, make sure that your VPN gateways support these capabilities and that you purchase sufficient licenses to cover the appropriate number of users and connections. Mail, content, and calendars. iPhone, iPad, and Mac work with Microsoft Exchange, office 365, and other popular email services, like Google Workspace, for instant access to push email, calendar, contacts, and tasks over an encrypted SSL connection.

10 If you use Microsoft Exchange, verify that the ActiveSync service is up to date and configured to support all users on the network. If you re using the cloud-based office 365, ensure that you have sufficient licenses to support the anticipated number of iOS and iPadOS devices that will be connected. iOS and iPadOS also support office 365 modern authentication leveraging OAuth and multifactor authentication. If you don t use Exchange, iOS and iPadOS work with standards-based servers, including IMAP, POP, SMTP, CalDAV, CardDAV, and LDAP. iOS and iPadOS Deployment Overview December 2021 6 Deployment Steps2. Identity management In addition to preparing your environment, IT teams will need to further lay the groundwork for Deployment by choosing the way they d like to manage authentication and authorization.


Related search queries